Security Analyst

  • Columbia, SC
  • Posted 1 day ago | Updated 1 day ago

Overview

On Site
Depends on Experience
Contract - W2
Contract - Independent
Contract - 12 Month(s)
No Travel Required

Skills

Security Analyst
ISSO
ITIL
ISC(2)
ISACA
SANS GIAC
Archer eGRC
NoSQL
zSeries
mainframe
Linux
Windows
Networking
Firewall
IPS
SIEM
IAM
Vulnerability management
Audit
FISMA
NIST
CMS MARS-E
HIPAA
RMF
SSPs
PIAs
ISAs
CMAs
A&A
Bizagi
Atlassian
Healthcare Information Technology
Database
Decision-making
EMC RSA Archer
Event Management
Computer Networking
Computer Science
Configuration Management
Cyber Security
Attention To Detail
Leadership
Management
Microsoft Excel
Microsoft Office
Information System Security
Information Systems
Intrusion Prevention
Issue Tracking
IBM System Z
Identity Management
Information Security
Information Security Management
Auditing
Privacy
Regulatory Compliance
Reporting
Risk Analysis
Microsoft Visio
Microsoft Windows
Multitasking
Network
Network Design
Authorization
Servers
Software Development Methodology
Switches
System Center
Risk Management
Risk Management Framework
Routing
SANS
Security Controls
Brand
Cloud Computing
Collaboration
IBM
Microsoft PowerPoint
RTR
System Security
Team Leadership
Training
Vendor Management

Job Details

Job ID: SC-8799

Onsite/Local Security Analyst/ISSO (ITIL/ISC(2)/ISACA/SANS GIAC) with Archer eGRC, NoSQL, zSeries/mainframe, Linux/Windows, Networking/Firewall, IPS, SIEM, IAM, Vulnerability management, Audit, FISMA/NIST/CMS MARS-E/HIPAA/RMF, SSPs/PIAs/ISAs/CMAs/A&A, Bizagi/Atlassian experience

Location: Columbia, SC (SCDHHS)
Duration: 12 Months

Work Location: Fully Onsite 5 days onsite. Candidates must be able to be onsite at Jefferson Square starting on the first day of employment. Remote work is not available for this position.
Candidate Location: Candidate MUST be a SC resident or willing to relocate to SC prior to starting the role at their own expense.

Required Knowledge/Skills:
1. Must have a strong working knowledge of FISMA, NIST, CMS MARS-E and HIPAA Security and Privacy.
2. 5+ years of experience in IT working with and/or auditing IBM System 390/zSeries, Windows, Linux, Databases (Relational and Non-Relational), Networking Infrastructure, and Web-based Applications.
3. Prior experience working within a FISMA compliant program.
4. Prior experience in working with any eGRC systems.
5. Prior Health Information Technology experience.
6. ISC(2), ISACA, SANS GIAC and/or other Information Security Certification is required.
7. Ability to work independently and as a member of a team.
8. Ability to collaborate and coordinate with multiple teams and vendors.
9. Ability to multitask and prioritize tasks effectively in order to meet deadlines.
10. Experience and training with eGRC solutions.
11. Ability to engage diverse audiences of varying technical and non-technical skill-levels to ensure effective alignment of technical requirements to business objectives.
12. Ability to collaborate and coordinate efforts amongst multiple teams and vendors in fulfillment of SCDHHS OCS initiatives.
13. Ability to multitask and prioritize tasks effectively in order to meet deadlines in a results-oriented environment.
14. Must have intermediate to advanced skills in Microsoft Office products (Word, Excel, PowerPoint, Visio) to include working with templates and style guidelines for branding consistency.
15. Keen attention to detail while maintaining the ability to see the big picture.
16. Ability to absorb, retain and communicate complex processes.
17. Ability to accept changes and constructive criticism and remain flexible in dealing with leadership and teams of varying technical and business knowledge.

Preferred Requirements/Skills:
1. BS degree in computer science or similar discipline or 10+ years of experience in the field or a in a related area.
2. Prior ITIL experience in the area of Information Security Management.

Preferred Requirements/Skills:
1. BS degree in computer science or similar discipline or 10+ years of experience in the field or a in a related area.
2. Prior ITIL experience in the area of Information Security Management.

PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
1. Prior ITIL experience in the area of Information Security Management

REQUIRED EDUCATION/CERTIFICATIONS:
1. ISC(2), ISACA, SANS GIAC and/or other Information Security Certification is required. PREFERRED EDUCATION/CERTIFICATIONS:
1. Bachelor s in a related area or 10+ years of experience in the field or in a related area.

PREFERRED EDUCATION/CERTIFICATIONS:
1. Bachelor s in a related area or 10+ years of experience in the field or in a related area.

SCOPE OF THE PROJECT:
The SCDHHS Office of Cybersecurity (OCS) is responsible for the Security and Compliance of SCDHHS Information Systems and Data. OCS seeks an expert Senior ISSO to oversee (and actively participate in) the day-to-day security and compliance requirements of complex information system operating environments. A successful Senior ISSO will lead the establishment, implementation and/or enhancement of Information Systems Security and Compliance efforts based on State/Agency Policy/Standards and Regulatory Guidance such as FISMA, NIST, CMS MARS-E, HIPAA, etc.)

DAILY DUTIES / RESPONSIBILITIES:
The Senior ISSO will report to the ISSO Team Lead in OCS and operate as an experienced cybersecurity consultant to SCDHHS leadership, business units, business partners and vendors.

Security Program Experience:
Leadership experience with CMS MARS-E, ARC-AMPE, or other FISMA Risk Management Framework (RMF) compliant programs is strongly desired and will be given the highest weight. Experience should include well documented success in the development and maintenance of System Security Plans (SSPs), Privacy Impact Assessments (PIAs), Interconnection Security Agreements (ISAs), Computer Matching Agreements (CMAs), and related interviews and audit/assessment activities to complete and verify these and other RMF/Assessment and Authorization (A&A) tasks and artifacts.

Experience with development and integration of RMF/A&A tasks and artifacts in RMF type roles such as; ISSO, Information Security Architect, Security Control Assessor, etc., into the System Development Life Cycle (SDLC) is ideal.

Experience in security as related to Cloud services and vendor management is considered desirable for this position.

Technical Knowledge:
Hands on experience with any or all the following technologies would be considered a desirable for this position:
1. Archer (eGRC)
2. Enterprise NoSQL Database
3. IBM System 390/zSeries
4. Linux and Windows servers
5. Network Firewalls, Intrusion Prevention Systems (IPS), Switching and Routing Infrastructure
6. Security Information and Event Management (SIEM) solutions
7. Identity and Access Management (IAM) solutions

General Duties and Responsibilities:
1. Perform detailed architectural reviews and risk analysis of security related requests in order to make sound decision making recommendations, such as:
a. Network Design and Information Flow
b. System and Data Access Models
c. Review Firewall Rule Requests (Ports, Protocols, and Services)
d. Baseline Configuration Management Deviation Requests
e. Vulnerability Management
2. Champion the design, development, implementation, and/or ongoing maturation of SCDHHS security and compliance efforts.
3. Audit and assess internal agency systems as well as business partner/service provider information system security controls.
4. Utilize Microsoft Office software suite, System Center Service Manager (Ticketing system), Archer eGRC system, Bizagi, Atlassian and other products to document and report on information gathered during Audit and Assessment activities or other OCS efforts.
5. Perform security and compliance reviews of Contracts, Business Associate Agreements, Data Usage/Sharing Agreements, and other types of documents
and artifacts.
6. Serve as primary point of contact for third-party audits and/or assessments
of agency and business partner systems
7. Collaborate with agency leadership, business partners, and other parties/ stakeholders to provide recommendations for security and compliance risk mitigation efforts.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.